Sciweavers

157 search results - page 11 / 32
» Optimizing Parallel Execution of Detailed Wireless Network S...
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Detecting selective forwarding attacks in wireless sensor networks
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like...
Bo Yu, Bin Xiao
NPL
1998
133views more  NPL 1998»
13 years 7 months ago
Parallel Coarse Grain Computing of Boltzmann Machines
Abstract. The resolution of combinatorial optimization problems can greatly benefit from the parallel and distributed processing which is characteristic of neural network paradigm...
Julio Ortega, Ignacio Rojas, Antonio F. Día...
IPPS
2000
IEEE
13 years 12 months ago
Reducing Ownership Overhead for Load-Store Sequences in Cache-Coherent Multiprocessors
Parallel programs that modify shared data in a cachecoherent multiprocessor with a write-invalidate coherence protocol create ownership overhead in the form of ownership acquisiti...
Jim Nilsson, Fredrik Dahlgren
PIMRC
2008
IEEE
14 years 1 months ago
Throughput optimization for multipath unicast routing under probabilistic jamming
Abstract—We present a framework for throughput optimization for multipath unicast routing in wireless networks in the presence of probabilistic jamming. The framework introduces ...
Patrick Tague, Sidharth Nabar, James A. Ritcey, Da...
AINA
2007
IEEE
14 years 1 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...